|John Viega||O'Reilly Media||ePub|
In the previous chapters, we discussed almost all of the algorithms used by the SSL protocol that make it secure. The one remaining class of algorithms is public key cryptography, which is an essential element of protocols like SSL, S/MIME, and PGP.
Depending on the algorithm employed, public key cryptography is useful for key agreement, digital signing, and encryption. Three commonly used public key algorithms are supported by OpenSSL: Diffie-Hellman (DH), DSA (Digital Signature Algorithm), and RSA (so named for its inventors, Rivest, Shamir, and Adleman). It's important to realize that these algorithms are not interchangeable. Diffie-Hellman is useful for key agreement, but cannot be used for digital signatures or encryption. DSA is useful for digital signatures, but is incapable of providing key agreement or encryption services. RSA can be used for key agreement, digital signing, and encryption.
Public key cryptography is expensive. Its strength is in the size of its keys, which are usually very large numbers. As a result, operations involving public key cryptography are slow. Most often, it is used in combination with other cryptographic algorithms such as message digests and symmetric ciphers.See All Chapters
|Joann Puffer Kotcher||University of North Texas Press|
✚ C ha p t e r 2 ✚
A Blacked-Out Runway
Friday, May 6, 1966, Tan Son Nhut Air Base, South Vietnam
ini-skirts came in. Detroit rolled out the Ford Mustang. Martin
Luther King Jr. led a march from Selma to Montgomery, Ala-
bama; and pot was still something to cook in. I was leaving that world and entering another.
The 707 descended, and just before its wheels touched the runway,
I refreshed my makeup. I was there to bring the soldiers reminders of home. Some of them hadn’t seen an American girl since they arrived in
Vietnam. The sun had long set. Out the window I saw flashes of artillery fire on the horizon all around the sparse lights of Saigon. America’s involvement in the war had just begun, and within six months, my old unit, the 1st Cavalry, would mark its one-year anniversary. Soldiers had started to rotate home. My introduction to real war began.
I was the only girl on board a chartered passenger jet filled with identical crew cuts and khaki, pressed uniforms. We had crossed the International Date Line, and I couldn’t figure out what day it was. I didn’t know whether we had lost a day or gained a day. We stopped for 20 minutes in Honolulu and for a short time at Clark Air Force Base, in the Philippines. A few other women had boarded at San Francisco, but when we left Clark they were gone. At the start of the flight all the menSee All Chapters
|Mike Wilson||O'Reilly Media||ePub|
The Web, already one of the fastest developing areas in technology, is accelerating. This is both good news and bad news for those of us planning to draw income from writing software. Today, good developers have the rare opportunity to do what they love, grow their horizons, and continually evolve and derive even greater satisfaction from their work, as long as theyre willing to put in the hard work necessary to understand a huge back catalog of rapidly-expanding knowledge.
Terrific careers come at a price. As a software developer, you must continually search for the next great tool that will help you achieve more, better, faster. What you work with 10 years from now is going to be a major departure from what you are working with todayin essence, you will be retraining yourself multiple times to keep sharp.
In his 2008 book Outliers (Back Bay Books), Malcolm Gladwell presents evidence that it takes 10,000 hours of effort to achieve mastery at a professional level. Even prodigies need to put in their time to achieve success; the difference between an average performer and a superb performer comes down to the amount of practice put in by the individual. Picking up a book like this puts you into the latter category; right now you are putting in the extra time to gain more exposure to the leading edge of this craft. The future is arriving, and you will be among the first positioned to take advantage of it.See All Chapters
|Enge, Eric||O'Reilly Media||ePub|
Learning everything you need to know about SEO is a difficult process that is made even more challenging and complex by the constant evolution of best practices and optimization opportunities.
Fortunately, a great variety of resources that make the job easier are available on the Web. Many leading SEO practitioners regularly post their thoughts on blogs or in forums, or speak at conferences. This creates many opportunities to interact with them, learn from their experience, and keep your skills sharp and up-to-date.
In this chapter, we will talk about those resources and how to leverage them to be more successful in your SEO efforts.
SEO is rapidly evolving. Search engines are constantly changing their algorithms, and new media and technologies are being introduced to the Web on a regular basis. Staying current requires an ongoing commitment to research.
One of the easiest ways to research what is happening in the world of SEO is to study the websites and periodicals that cover SEO in detail, but ongoing testing of SEO hypotheses should also play a role.See All Chapters
|Margaret Cohen||Karnac Books||ePub|
“The dream that invents me has its eyes wide open And I close my eyes to look at the world.”
Claude Roy, quoted by Pontalis (2011, p. 16)
It was during Donald Meltzer's last visit to Buenos Aires that I had the privilege of being supervised by him on a very complicated clinical case that I was treating at that time. A young homosexual woman had been coming for treatment and had developed a very open and intense transference love: “A very complicated woman; very sensual, very erotic, and very homosexual. What is going to happen with her rude demand of and erotic and sensual gratification towards her analyst? We will see. But she seems armed to the teeth against parental care from her analyst.” In this way Meltzer opened his comment and shared with us his usual very interesting ideas; but there was one in particular that I kept in mind, echoing down time. He said: “This could be thought of as resistance, but it is not. I guess that she has opened the door to her pornographic concern and to her masochism and she wants you to feel guilty for having profited from the opened door which allowed you to investigate what has been revealed…. Everything is opened here, there is no resistance.” And later he added, “All the material is now present for Monica to explore as slowly or as fast as she would wish…”.See All Chapters
|Anthony T., III Holdener||O'Reilly Media||ePub|
The following is an alphabetical list of some of the more useful and popular web services on the Internet, a snapshot of some of the possibilities available at the time this was published. Instead of giving too much detail on every web service, I have categorized each service and provided a brief overview regarding its features. You will find a link to each web service's API page on the Internet, as well as a brief description of the service. I have also defined the protocol each service uses, and given additional information, such as whether an account or developer key is required to use the web service, and, most important, how much the service costs to use. This list isn't intended to be all-inclusive, as the list of web services on the Internet is in constant flux. With that said, you can find a similar list of web services, categorized and with much the same information as I provide in this appendix, at ProgrammableWeb (http://www.programmableweb.com/).See All Chapters
|Aida Alayarian||Karnac Books||ePub|
In this chapter I discuss working with unaccompanied minors, trafficked children, child soldiers, and children of refugees and their families. Here, I aim to give an idea of what is faced by children of refugees, the necessary and frivolousness need for therapy by outlining the stories of four such children as illustrative examples of the varied and extreme experiences endured by an individual child.
A large number of children of refugees are unaccompanied minors who are left facing the struggles of building a future alone. These brief vignettes illustrate the importance and necessity of their access to therapy.
Aran was seven-year-old boy during initial stages of ethnic cleansing in his country. The police in his village (from the majority ethnic group) had a station next to the village football pitch. Shooting the ball while the children were playing became a favourite pastime, followed by beatings of any child who protested.See All Chapters
|Ian Molyneaux||O'Reilly Media||ePub|
The following example is based on a typical performance project template in MS Project. The “profiling” section involves an additional transaction optimization step aimed at detecting and addressing—prior to performance test execution—application-related problems that may hurt scalability and response time.
The MS Project file is available from the book’s companion web site.See All Chapters
|Kenneth J. Schoon||Quarry Books||ePub|
Octave Chanute was already well known as a brilliant engineer before he began his experiments in aviation at the Indiana Dunes. The chief engineer for the Erie Railroad, he had designed railroad bridges, flood control dams, and even the Kansas City and Chicago Stockyards. Chanute, Kansas, is named for him.
Chanute’s avocation, however, was flying machines. He gathered stories about others who were making and testing flying machines and published a series of twenty-seven articles about aviation in The Railroad and Engineering Journal. His book Progress in Flying Machines came out in 1894.
Chanute recognized that stability was the primary problem with existing gliders. Being an engineer himself, he decided to design a glider that could be controlled by a pilot with a minimum of effort. He also decided that the soft sands of the Indiana Dunes would be perfect for testing various “machines.”
So it was that on June 22, 1896, sixty-two-year-old Octave Chanute, accompanied by his son, Charles, William Avery, and Augustus Herring, took the train from Chicago to the dunes at Miller. Besides provisions and camping gear, they took along two disassembled gliders and a kite.See All Chapters
|Rowman & Littlefield Publishers||ePub|
Barbara B. Levin
Lessons Learned From Secondary Schools Using Technology for School Improvement
It’s Just Not That Simple!
ABSTRACT: The purpose of this article is to describe lessons learned from studying the leadership in eight award-winning secondary schools and districts that were recognized for successfully leveraging technology as part of their efforts for school improvement. Data were collected through observations, interviews, and document analysis in schools and districts with ethnically, linguistically, and socioeconomically diverse students in communities facing the types of challenges that many schools face today. Based on the cross-case analysis of eight intrinsic case studies, this article offers numerous examples and lessons learned about the role that leadership and vision, technology planning and support, professional development, curriculum and instructional practices, school culture, funding, and partnerships play in leveraging technology for school improvement.See All Chapters
|Salley Mavor||C&T Publishing||ePub|
Dressed in the colors of fall, these wee folk are busy gathering seeds and berries to keep in store for the coming cold weather.
For more specific directions, see these sections:
Basic Materials for Most Dolls
Faces, clothing, and accessories: See Making Wee Folk and Fairies.
Makes 1 Father doll or 1 Mother doll.
1 standard 4˝ doll armature or 1 sturdy 4½˝ doll armature
1 unvarnished 16mm wooden bead for head
1 acorn cap to fit bead head
Wool fleece for Mother’s hair
Metallic seed beads for buttons
Boy and Girl (2½˝ dolls)
Makes 1 Girl or 1 Boy doll.
1 standard 2½˝ doll armature
1 unvarnished 12mm or 14mm wooden bead for head
1 acorn cap to fit bead head
Wool fleece for Girl’s hair
Size 3 perle cotton for beltSee All Chapters
|Robert J. Marzano||Marzano Research||ePub|
In chapter 1, we identified a small set of 21st century skills that have been researched and vetted throughout the 20th century and will likely have great utility throughout the 21st century. Five categories of skills were identified and organized into two sets: cognitive skills and conative skills. Cognitive skills include:
1. Analyzing and utilizing information
2. Addressing complex problems and issues
3. Creating patterns and mental models
Conative skills include:
4. Understanding and controlling oneself
5. Understanding and interacting with others
This chapter is a brief but representative review of the research and theory on the cognitive and conative skills addressed in this book.
The 21st century brings increased access to a vast plain of information. The video InfoWhelm and Information Fluency (21st Century Fluency Project, 2010) stated that our worldwide collective digital output by 2009 was five hundred exabytes of data. If you wanted to record five hundred exabytes in printed form, you would need enough books to connect Earth and Pluto thirteen times (and printing them would deforest Earth twelve times)!See All Chapters
|Tom Coens||Berrett-Koehler Publishers||ePub|
Ultimately, managers aren’t responsible for their people’s performance. People are responsible for their own performance. There’s feedback all around you—if you pay attention. If you’re not getting enough feedback, ask for it.
Anne Saunier, Fast Company
In any well-functioning organization, anyone ought to feel free to give anyone else feedback.
Peter Quarry, Feedback Solutions
Giving good feedback. Everyone thinks it is important. It’s what supervisors are supposed to do. If supervisors were organized like Boy Scouts, “to give good feedback” would be the first item of the official oath. And while everyone acknowledges its value and importance, timely and helpful feedback is conspicuously absent for most people in organizational life. The “art” of feedback is seldom practiced by many, and when practiced, it is practiced badly. In large part, the culprit is the prevailing practice of appraisal, which engenders many false notions about the nature of feedback. Beyond appraisal, many of us fail at giving and receiving feedback because we do not understand its true dynamics. Our expectations of feedback are unrealistic, and we fail to see the barricades that obstruct and distort the flow of communication and openness to change. 116See All Chapters
|Deepak Malhotra||Berrett-Koehler Publishers||ePub|
Zed was a mouse who did not care much for cheese. He ate cheese because it helped sustain his body. And he cared to sustain his body mostly because it was needed to sustain his mind.
Zed had a reputation for being wise, although few mice had ever spoken with him in great depth. He was a popular mouse, but he usually only spoke on important matters when someone else initiated the conversation. Zed loved company, but he seemed to appreciate moments of solitude just as much.
Zed had a magnetic personality. He had a certain look in his eyes—and a half smile—that mesmerized his audiences. And an audience is what they were—the mice who visited him were there to be in his company, to hear him speak, to be rejuvenated. No one could quite explain why he had such an effect on them.
What they knew, and what every other mouse came to know, was that Zed was a mouse like no other. He did not care for cheese, he did not care to learn how to navigate the maze, and he did not feel compelled to follow the routines and customs of the other mice. Yet, somehow, it was clear that Zed loved his life—the life of a mouse—more than any other mouse they had ever known.See All Chapters
|Dick Axelrod||Berrett-Koehler Publishers||ePub|
In nature we never see anything isolated, but everything in connection with something else which is before it, beside it, under it, and over it.
JOHANN WOLFGANG VON GOETHE
In the previous chapter, you learned how creating a welcoming environment lays the groundwork for a productive meeting. In this chapter, you will learn how personal connection builds trust. Connection to the task unleashes energy.
We’re so glad you’re here.
To tell the truth, you’re a pain.
My patience is running thin. I went along with the welcoming business in the last chapter, but enough already. Now you are into this connecting nonsense. You are wasting more of my time. When do I get to do the real work?
This is real work. The real work rests on the base of the first two sections of the Meeting Canoe, welcome and connect people to each other and the task.
If you rush through building the meeting’s foundation, the meeting will crumble. Building a solid foundation for your meeting allows the meeting to carry a heavy load.See All Chapters